Abstract
Cloud computing and Database as a service have gaining rapid interest by many organizations today because of its cost effectiveness but it faced a lot of security issued in protecting client business sensitive data, the traditional encryption techniques for database security cannot ensure that a database is safe for intrusion, unauthorized access and queries processes over encrypted data in the present technological evolution. This paper presents a review of Order Preserving Encryption schemes (OPES) a technique for database encryption which execute range queries in an efficient manner, the existing approaches of database encryption techniques using OPE, Principles, and Application of OPE, various types of Attack on OPE and overview of Mutable order Preserving Encoding mOPE.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmed, S., Annisa, A., Zaman, A., Zhang, Z., Md. Rokibul Alam, K., Morimoto, Y.: Semi-order preserving encryption technique for numeric database. Int. J. Network. Comput. 9(1). www.ijnc.org, ISSN 2185–2847, pages 111,129, January 2019
Liang, J., Qin, Z., Xiao, S., Zhang, J., Yin, H., Li, K.: Privacy-preserving range query over multi-source electronic health records in public clouds. J. Parallel Distrib. Comput. 135, 127–139 (2020)
Moghadam, S.S., Fayoumi, A.: Toward securing cloud-based data analytics: a discussion on current solutions and open issues", IEEE Access 7 (2019)
Ali, N.D., Ahmed, A.K.: Enhancing performance of search over encrypted data in cloud computing. Int. J. Comput. Sci. Trends Technol. (IJCST) 7(6), November–December 2019
Lai, S., Patranabis, S., Sakzad, A., Liu, J.K., Mukhopadhyay, D., Steinfeld, R., Sun, S.-F., Liu, D., Zuo, C.: Result pattern hiding searchable encryption for conjunctive queries. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 745–762 (2018)
Chowdhury, A.R., Ramanathan, P.: Public order preserving cipher generation scheme for distributed computing. In: Association for Computing Machinery, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2273–2275 (2018)
Grubbs, P., Sekniqi, K., Bindschaedler, V., Naveed, M., Ristenpart, T.: Leakage-abuse attacks against order-revealing encryption. In: 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, pp. 655-672 (2017)
Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.): ESORICS/DPM/CBT -2017. LNCS, vol. 10436. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67816-0
Chenette, N., Lewi, K., Weis, S.A., Wu, D.J.: Practical Order-Revealing Encryption with Limited Leakage, Fast Software Encryption, March 2016
Lewi, K., David, J.: Order-revealing encryption: new constructions, applications, and lower bounds. IACR Cryptology ePrint Archive 2016, 612 (2016)
Yang, C., Zhang, W., Yu, N.: Semi-Order Preserving Encryption. Information Sciences 387 (2016). https://doi.org/10.1016/j.ins.2016.12.025
Li, K., Zhang, W., Yang, C., Yu, N.: Security analysis on oneto-many order preserving encryption-based cloud data search. In: IEEE Trans. Inf. Forens. Secur. 10(9), 1918–1926 (2015)
Mavroforakis, C., Chenette, N., O’Neill, A., Kollios, G., Canetti, R.: Modular order-preserving encryption. In: Association for Computing Machinery, Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 763–777 (2015)
Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. Computer Science Faculty Publications and Presentations. 153 (2015)
Kerschbaum, F.: Frequency-hiding order-preserving encryption. In: Association for Computing Machinery, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 656–667 (2015)
Reddy, K.S., Ramachandram, S.: A novel dynamic order preserving encryption scheme. In: 2014 First International Conference on Networks and Soft Computing (ICNSC2014), Guntur, 2014, pp. 92–96 (2014). https://doi.org/10.1109/CNSC.2014.6906720
Popa, R.A., Li, F.H., Zeldovich, N.: An ideal security protocol for order-preserving encoding. In: IEEE Symposium on Security and Privacy, pp. 463–477 (2013)
Liu, D., Wang, S.: Nonlinear order preserving index for encrypted database query in service cloud environments. Concurr. Comput. Practice Exp. Wiley Online Library 25(13), 1967–1984 (2013)
Xiao, L., Yen, I.-L., Huynh, D.T. Extending order preserving encryption for multi-user systems. Cryptology ePrint Archive, Report 2012/192 (2012)
Boldyreva, A., Chenette, N., O’Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578–595. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_33
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 563–574 (2004). https://doi.org/10.1145/1007568.1007632
Acknowledgements
We thank anonymous reviewers for their valuable comments. This research was supported in part by the Tianjin Natural Science Foundation (16JCYBJC15800) and the Fundamental Research Funds Nankai University (z1a2085588) for the Central Universities and the Foreign Aid program funded by the Ministry of Commerce (MOFCOM) of P. R. China.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Kamara, M.A., Li, X. (2021). A Review of Order Preserving Encryption Schemes. In: Meng, H., Lei, T., Li, M., Li, K., Xiong, N., Wang, L. (eds) Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery. ICNC-FSKD 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 88. Springer, Cham. https://doi.org/10.1007/978-3-030-70665-4_77
Download citation
DOI: https://doi.org/10.1007/978-3-030-70665-4_77
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70664-7
Online ISBN: 978-3-030-70665-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)